wearehere browser extension scans sites for tracking and privacy risks

wearehere is a browser extension that scans websites you visit and scores them based on privacy and tracking behaviors, turning the tables on the data collection that typically targets users.
What it scans
The extension performs ten different scans on each site:
- Cookies — how many they drop, who set them, how long they last
- Network — every domain your browser contacts behind your back
- Trackers — hidden scripts from companies you've never heard of
- Profiling — fingerprinting your device through canvas, WebGL, fonts
- Pressure — dark patterns engineered to rush or guilt you into clicking
- Terms — toxic clauses buried in policies they know you won't read
- Stored data — tracking IDs hidden where cookie clears can't reach
- Watching — scripts stealing your form inputs before you hit submit
- Clicks — links routing through tracking redirects before reaching the page
- Selling data — data brokers detected in your network traffic
Technical details
The extension is under 200KB with no frameworks, no cloud dependencies, and no account required. Nothing leaves your browser — it reads what your browser already knows and presents the information. Results are color-coded: green means clean, red means leave, with a full dashboard available for evidence.
AI agent integration
wearehere also ships as an npm package and pairs with barebrowse, an MCP server that gives AI agents a real browser. barebrowse lets your agent navigate, click, fill forms, and take screenshots through Claude, ChatGPT, or any MCP-compatible assistant. With wearehere added, your agent can privacy-audit any URL before interacting with it.
Example use case: "Assess this site before I sign up." Your agent browses the page, runs the ten scans, and returns with a score and evidence. If it's red, it doesn't proceed — enabling privacy-aware browsing at the agent level.
Development background
This is the finale of the weare____ series — eight extensions that each pulled back a different curtain, now combined into one scan: wearecooked, wearebaked, weareleaking, wearelinked, wearewatched, weareplayed, wearetosed, and wearesilent.
The extension will be available soon on Chrome extension and Firefox Add-ons stores, and is fully open source on GitHub.
📖 Read the full source: r/ClaudeAI
👀 See Also

Open-source Go port of Claude Code CLI released as claw-code-go
Developer dolm09 has released claw-code-go, a full Go port of the Claude Code CLI with a self-contained binary under 10K lines of code. The project includes a TUI with bubbletea, multi-provider support, MCP client, and tool execution engine.

Claude-rank: Claude Code Plugin for AI Search Visibility Audits
Claude-rank is a free Claude Code plugin and CLI that audits technical foundations for AI search visibility, handling technical SEO, AI citability scoring, crawlability checks for AI bots, and automated fixes for discoverability issues.

Parallel Coding Agents with tmux and Markdown Specs
Manuel Schipper describes a system for running 4-8 parallel coding agents using tmux, Markdown files, bash aliases, and six slash commands. The setup uses Feature Design (FD) Markdown specs tracked through an 8-stage lifecycle.

Building a Programming Language with Claude Code: The Cutlet Experiment
Ankur Sethi built a complete programming language called Cutlet using Claude Code over four weeks, with the AI generating every line of code while he focused on guardrails and testing. The language features dynamic typing, vectorized operations, and a REPL, running on macOS and Linux.